mirror of
https://github.com/yeslayla/nakama-helm-chart.git
synced 2025-09-14 00:03:39 +02:00
Compare commits
2 Commits
feature/pr
...
7e496a1228
Author | SHA1 | Date | |
---|---|---|---|
7e496a1228 | |||
a9e6eb3387 |
@ -3,7 +3,7 @@ Description: Nakama ECS Task
|
|||||||
Parameters:
|
Parameters:
|
||||||
ServerName:
|
ServerName:
|
||||||
Type: String
|
Type: String
|
||||||
Default: "nakama-default"
|
Default: "main"
|
||||||
NakamaContainer:
|
NakamaContainer:
|
||||||
Type: String
|
Type: String
|
||||||
Description: test
|
Description: test
|
||||||
@ -46,9 +46,41 @@ Parameters:
|
|||||||
Conditions:
|
Conditions:
|
||||||
CreateSecret: !Equals [!Ref NakamaPasswordOverride, ""]
|
CreateSecret: !Equals [!Ref NakamaPasswordOverride, ""]
|
||||||
NoRepositoryCredentials: !Equals [!Ref RepositoryCredentialsSecret, ""]
|
NoRepositoryCredentials: !Equals [!Ref RepositoryCredentialsSecret, ""]
|
||||||
|
RepositoryCredentials: !Not [!Equals [!Ref RepositoryCredentialsSecret, ""]]
|
||||||
|
|
||||||
Resources:
|
Resources:
|
||||||
|
|
||||||
|
EcsExecutionerRole:
|
||||||
|
Type: AWS::IAM::Role
|
||||||
|
Properties:
|
||||||
|
AssumeRolePolicyDocument:
|
||||||
|
Version: '2012-10-17'
|
||||||
|
Statement:
|
||||||
|
- Effect: Allow
|
||||||
|
Principal:
|
||||||
|
Service:
|
||||||
|
- ecs-tasks.amazonaws.com
|
||||||
|
Action:
|
||||||
|
- sts:AssumeRole
|
||||||
|
ManagedPolicyArns:
|
||||||
|
- arn:aws:iam::aws:policy/CloudWatchLogsFullAccess
|
||||||
|
EcsExecutionPolicy:
|
||||||
|
Condition: RepositoryCredentials
|
||||||
|
Type: AWS::IAM::Policy
|
||||||
|
Properties:
|
||||||
|
PolicyName: AllowGettingSecrets
|
||||||
|
Roles:
|
||||||
|
- !Ref EcsExecutionerRole
|
||||||
|
PolicyDocument:
|
||||||
|
Statement:
|
||||||
|
- Sid: ReadDockerSecret
|
||||||
|
Action:
|
||||||
|
- secretsmanager:Describe*
|
||||||
|
- secretsmanager:Get*
|
||||||
|
- secretsmanager:List*
|
||||||
|
Effect: Allow
|
||||||
|
Resource: !Ref RepositoryCredentialsSecret
|
||||||
|
|
||||||
AdminPortalPassword:
|
AdminPortalPassword:
|
||||||
Type: AWS::SecretsManager::Secret
|
Type: AWS::SecretsManager::Secret
|
||||||
Condition: CreateSecret
|
Condition: CreateSecret
|
||||||
@ -68,6 +100,7 @@ Resources:
|
|||||||
TaskDefinition:
|
TaskDefinition:
|
||||||
Type: AWS::ECS::TaskDefinition
|
Type: AWS::ECS::TaskDefinition
|
||||||
Properties:
|
Properties:
|
||||||
|
ExecutionRoleArn: !Ref EcsExecutionerRole
|
||||||
ContainerDefinitions:
|
ContainerDefinitions:
|
||||||
- !If
|
- !If
|
||||||
- NoRepositoryCredentials
|
- NoRepositoryCredentials
|
||||||
|
Reference in New Issue
Block a user